GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

The State of DDoS Weapons

DDoS attacks continue to grow in frequency, intensity, and sophistication. However, the delivery method of using infected botnets and vulnerable servers to perform crushing attacks on a massive scale has not changed. Unlike other cyber attacks, where attackers leverage obfuscation to prevent detection, the loud distributed nature of DDoS attacks creates opportunities for defenders to take a proactive approach by focusing on the weapon’s location.

Attackers leverage vulnerabilities in the UDP protocol to spoof the target’s IP address and exploit vulnerabilities in servers that initiate a reflected response. This strategy amplifies the attack by producing server responses that are much larger than the initial requests.

 

Interested in cybersecurity? Check out this GovWhitePapers blog post! You can also find events on cybersecurity on our sister site, GovEvents.

 

  • Author(s):
  • A10 Networks
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
The State of DDoS Weapons
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:A10 Networks
Published:July 1, 2020
License:Copyrighted
Copyright:© 2020 A10 Networks, Inc. All rights reserved.

Featured Content

Contact Publisher

Claim Content